Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe
Resource
win10v2004-20240508-en
General
-
Target
4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe
-
Size
2.4MB
-
MD5
e9a206c0bd840e0b901df908ad9d1646
-
SHA1
d5bb9696c462f84abc76209cbcb1fd8cacc753dc
-
SHA256
4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5
-
SHA512
4011b06cef9b3a417248b727c62d07b19884a3a3e63acc5bb0cf1d44c35fa4bd78db0e4b930332af0cfcaa0b52ab9ec0f38909d150558526e06ab12e1eaf85f8
-
SSDEEP
49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJH:J+Qf7cqA0bt2rK09cohiLUbQJJH
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe Token: SeIncreaseQuotaPrivilege 8272 WMIC.exe Token: SeSecurityPrivilege 8272 WMIC.exe Token: SeTakeOwnershipPrivilege 8272 WMIC.exe Token: SeLoadDriverPrivilege 8272 WMIC.exe Token: SeSystemProfilePrivilege 8272 WMIC.exe Token: SeSystemtimePrivilege 8272 WMIC.exe Token: SeProfSingleProcessPrivilege 8272 WMIC.exe Token: SeIncBasePriorityPrivilege 8272 WMIC.exe Token: SeCreatePagefilePrivilege 8272 WMIC.exe Token: SeBackupPrivilege 8272 WMIC.exe Token: SeRestorePrivilege 8272 WMIC.exe Token: SeShutdownPrivilege 8272 WMIC.exe Token: SeDebugPrivilege 8272 WMIC.exe Token: SeSystemEnvironmentPrivilege 8272 WMIC.exe Token: SeRemoteShutdownPrivilege 8272 WMIC.exe Token: SeUndockPrivilege 8272 WMIC.exe Token: SeManageVolumePrivilege 8272 WMIC.exe Token: 33 8272 WMIC.exe Token: 34 8272 WMIC.exe Token: 35 8272 WMIC.exe Token: SeIncreaseQuotaPrivilege 8272 WMIC.exe Token: SeSecurityPrivilege 8272 WMIC.exe Token: SeTakeOwnershipPrivilege 8272 WMIC.exe Token: SeLoadDriverPrivilege 8272 WMIC.exe Token: SeSystemProfilePrivilege 8272 WMIC.exe Token: SeSystemtimePrivilege 8272 WMIC.exe Token: SeProfSingleProcessPrivilege 8272 WMIC.exe Token: SeIncBasePriorityPrivilege 8272 WMIC.exe Token: SeCreatePagefilePrivilege 8272 WMIC.exe Token: SeBackupPrivilege 8272 WMIC.exe Token: SeRestorePrivilege 8272 WMIC.exe Token: SeShutdownPrivilege 8272 WMIC.exe Token: SeDebugPrivilege 8272 WMIC.exe Token: SeSystemEnvironmentPrivilege 8272 WMIC.exe Token: SeRemoteShutdownPrivilege 8272 WMIC.exe Token: SeUndockPrivilege 8272 WMIC.exe Token: SeManageVolumePrivilege 8272 WMIC.exe Token: 33 8272 WMIC.exe Token: 34 8272 WMIC.exe Token: 35 8272 WMIC.exe Token: SeIncreaseQuotaPrivilege 8376 WMIC.exe Token: SeSecurityPrivilege 8376 WMIC.exe Token: SeTakeOwnershipPrivilege 8376 WMIC.exe Token: SeLoadDriverPrivilege 8376 WMIC.exe Token: SeSystemProfilePrivilege 8376 WMIC.exe Token: SeSystemtimePrivilege 8376 WMIC.exe Token: SeProfSingleProcessPrivilege 8376 WMIC.exe Token: SeIncBasePriorityPrivilege 8376 WMIC.exe Token: SeCreatePagefilePrivilege 8376 WMIC.exe Token: SeBackupPrivilege 8376 WMIC.exe Token: SeRestorePrivilege 8376 WMIC.exe Token: SeShutdownPrivilege 8376 WMIC.exe Token: SeDebugPrivilege 8376 WMIC.exe Token: SeSystemEnvironmentPrivilege 8376 WMIC.exe Token: SeRemoteShutdownPrivilege 8376 WMIC.exe Token: SeUndockPrivilege 8376 WMIC.exe Token: SeManageVolumePrivilege 8376 WMIC.exe Token: 33 8376 WMIC.exe Token: 34 8376 WMIC.exe Token: 35 8376 WMIC.exe Token: SeIncreaseQuotaPrivilege 8376 WMIC.exe Token: SeSecurityPrivilege 8376 WMIC.exe Token: SeTakeOwnershipPrivilege 8376 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1792 wrote to memory of 8244 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 28 PID 1792 wrote to memory of 8244 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 28 PID 1792 wrote to memory of 8244 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 28 PID 1792 wrote to memory of 8244 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 28 PID 8244 wrote to memory of 8272 8244 cmd.exe 30 PID 8244 wrote to memory of 8272 8244 cmd.exe 30 PID 8244 wrote to memory of 8272 8244 cmd.exe 30 PID 8244 wrote to memory of 8272 8244 cmd.exe 30 PID 1792 wrote to memory of 8352 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 32 PID 1792 wrote to memory of 8352 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 32 PID 1792 wrote to memory of 8352 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 32 PID 1792 wrote to memory of 8352 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 32 PID 8352 wrote to memory of 8376 8352 cmd.exe 34 PID 8352 wrote to memory of 8376 8352 cmd.exe 34 PID 8352 wrote to memory of 8376 8352 cmd.exe 34 PID 8352 wrote to memory of 8376 8352 cmd.exe 34 PID 1792 wrote to memory of 8408 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 35 PID 1792 wrote to memory of 8408 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 35 PID 1792 wrote to memory of 8408 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 35 PID 1792 wrote to memory of 8408 1792 4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe 35 PID 8408 wrote to memory of 8432 8408 cmd.exe 37 PID 8408 wrote to memory of 8432 8408 cmd.exe 37 PID 8408 wrote to memory of 8432 8408 cmd.exe 37 PID 8408 wrote to memory of 8432 8408 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe"C:\Users\Admin\AppData\Local\Temp\4969b770093b79f1bc956b6b275eb9f7280f490a82ae8329881ac4aabd5f4ed5.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- Suspicious use of WriteProcessMemory
PID:8244 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:8272
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- Suspicious use of WriteProcessMemory
PID:8352 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:8376
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- Suspicious use of WriteProcessMemory
PID:8408 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵PID:8432
-
-